Pluralsight-CompTIA-Secu-1oK7u
- 01. Risk and Related Concepts\\/01_01-Module Overview.mp48.50MB
- 01. Risk and Related Concepts\\/01_02-The Security Cycle.mp45.90MB
- 01. Risk and Related Concepts\\/01_03-Control Types.mp419.83MB
- 01. Risk and Related Concepts\\/01_04-Incident Response.mp411.78MB
- 01. Risk and Related Concepts\\/01_05-False Positives False Negatives and Security Policies.mp421.53MB
- 01. Risk and Related Concepts\\/01_06-Risk Calculation.mp419.56MB
- 01. Risk and Related Concepts\\/01_07-MTTF MTTR and MTBF.mp47.27MB
- 01. Risk and Related Concepts\\/01_08-Threat Vectors Vulnerabilities and naging Risk.mp411.80MB
- 01. Risk and Related Concepts\\/01_09-Risk oidance and Risks Associated With Cloud Computing.mp49.47MB
- 01. Risk and Related Concepts\\/01_10-RPO and RTO.mp411.65MB
- 02. Risks Associated With 3rd Party Integration\\/02_01-Course Overview and Onboarding Process.mp46.74MB
- 02. Risks Associated With 3rd Party Integration\\/02_02-3rd Party Integration.mp44.26MB
- 02. Risks Associated With 3rd Party Integration\\/02_03-OffBoarding Process.mp42.31MB
- 02. Risks Associated With 3rd Party Integration\\/02_04-Social Media Networks and Applications.mp44.04MB
- 02. Risks Associated With 3rd Party Integration\\/02_05-SLA.mp43.92MB
- 02. Risks Associated With 3rd Party Integration\\/02_06-BPA.mp41.09MB
- 02. Risks Associated With 3rd Party Integration\\/02_07-MOU and ISA.mp46.39MB
- 02. Risks Associated With 3rd Party Integration\\/02_08-Privacy Considerations and Data Ownership.mp47.24MB
- 02. Risks Associated With 3rd Party Integration\\/02_09-Data Backups.mp42.27MB
- 02. Risks Associated With 3rd Party Integration\\/02_10-Security Policies and Procedures.mp43.40MB
- 02. Risks Associated With 3rd Party Integration\\/02_11-Review Agreements and Verify Compliance.mp44.42MB
- 03. Risk Mitigation Strategies\\/03_01-Module Overview.mp41.92MB
- 03. Risk Mitigation Strategies\\/03_02-Change nagement.mp418.40MB
- 03. Risk Mitigation Strategies\\/03_03-Incident nagement.mp44.87MB
- 03. Risk Mitigation Strategies\\/03_04-User Rights and Permissions Review.mp46.72MB
- 03. Risk Mitigation Strategies\\/03_05-Perform Routine Audits.mp42.14MB
- 03. Risk Mitigation Strategies\\/03_06-Preventing Data Loss or Theft.mp43.43MB
- 03. Risk Mitigation Strategies\\/03_07-Attack Vectors.mp42.77MB
- 03. Risk Mitigation Strategies\\/03_08-Enforce Technology Controls.mp46.07MB
- 03. Risk Mitigation Strategies\\/03_09-Module Review.mp41.42MB
- 04. Implementing Basic Forensic Procedures\\/04_01-Module Overview.mp42.67MB
- 04. Implementing Basic Forensic Procedures\\/04_02-What Is Computer Forensics.mp45.45MB
- 04. Implementing Basic Forensic Procedures\\/04_03-Order of Volatility.mp411.85MB
- 04. Implementing Basic Forensic Procedures\\/04_04-First Responder Best Practices.mp410.93MB
- 04. Implementing Basic Forensic Procedures\\/04_05-Capture a System Ige.mp49.13MB
- 04. Implementing Basic Forensic Procedures\\/04_06-Network Traffic and Logs.mp49.62MB
- 04. Implementing Basic Forensic Procedures\\/04_07-Capture Video.mp41.99MB
- 04. Implementing Basic Forensic Procedures\\/04_08-Record Time Offset.mp46.01MB
- 04. Implementing Basic Forensic Procedures\\/04_09-Take Hashes.mp412.97MB
- 04. Implementing Basic Forensic Procedures\\/04_10-Screenshots.mp42.84MB
- 04. Implementing Basic Forensic Procedures\\/04_11-Witnesses.mp44.50MB
- 04. Implementing Basic Forensic Procedures\\/04_12-Track n Hours and Expense.mp46.58MB
- 04. Implementing Basic Forensic Procedures\\/04_13-Chain of Custody.mp47.47MB
- 04. Implementing Basic Forensic Procedures\\/04_14-Big Data Analysis.mp48.25MB
- 04. Implementing Basic Forensic Procedures\\/04_15-Module Review.mp42.57MB
- 05. Incident Response Concepts\\/05_01-Module Overview.mp43.56MB
- 05. Incident Response Concepts\\/05_02-Incident Preparation.mp417.36MB
- 05. Incident Response Concepts\\/05_03-Incident Identification.mp44.26MB
- 05. Incident Response Concepts\\/05_05-Incident Notification and Escalation.mp49.43MB
- 05. Incident Response Concepts\\/05_06-Incident Mitigation and Isolation.mp47.67MB
- 05. Incident Response Concepts\\/05_07-Lessons Learned.mp43.37MB
- 05. Incident Response Concepts\\/05_08-Incident Reporting.mp47.41MB
- 05. Incident Response Concepts\\/05_09-Recovery and Reconstitution Procedures.mp42.51MB
- 05. Incident Response Concepts\\/05_10-First Responder.mp43.21MB
- 05. Incident Response Concepts\\/05_11-Incident Isolation.mp47.34MB
- 05. Incident Response Concepts\\/05_12-Data Breach.mp49.01MB
- 05. Incident Response Concepts\\/05_13-Dage and Loss Control.mp45.02MB
- 05. Incident Response Concepts\\/05_14-Module Review.mp41.76MB
- 06. Security Related Awareness and Training\\/06_01-Module Overview.mp42.33MB
- 06. Security Related Awareness and Training\\/06_02-Security Policy Training and Procedures.mp46.22MB
- 06. Security Related Awareness and Training\\/06_03-Validate Compliance and Security Posture.mp42.08MB
- 06. Security Related Awareness and Training\\/06_04-Role ba<x>sed Training.mp42.54MB
- 06. Security Related Awareness and Training\\/06_05-Personally Identifiable Infortion.mp43.16MB
- 06. Security Related Awareness and Training\\/06_06-Infortion Classification.mp44.05MB
- 06. Security Related Awareness and Training\\/06_07-Data Labeling Handling and Disposal.mp47.78MB
- 06. Security Related Awareness and Training\\/06_08-Compliance.mp48.46MB
- 06. Security Related Awareness and Training\\/06_09-User Habits.mp417.18MB
- 06. Security Related Awareness and Training\\/06_10-New Threats Security Trends and Alerts.mp46.22MB
- 06. Security Related Awareness and Training\\/06_11-Use of Social Networking and P2P.mp46.12MB
- 06. Security Related Awareness and Training\\/06_12-Module Review.mp43.04MB
- 07. Physical and Environmental Controls\\/07_01-Module Overview.mp42.62MB
- 07. Physical and Environmental Controls\\/07_02-Environmental Factors.mp43.12MB
- 07. Physical and Environmental Controls\\/07_03-HVAC.mp45.45MB
- 07. Physical and Environmental Controls\\/07_04-Fire Suppression.mp48.37MB
- 07. Physical and Environmental Controls\\/07_05-EMI Shielding.mp45.83MB
- 07. Physical and Environmental Controls\\/07_06-Hot and Cold Aisles.mp46.74MB
- 07. Physical and Environmental Controls\\/07_07-Environmental Monitoring.mp43.97MB
- 07. Physical and Environmental Controls\\/07_08-Temperature and Humidity Controls.mp43.87MB
- 07. Physical and Environmental Controls\\/07_09-Physical Security Locks ntraps and Video Surveillance.mp48.55MB
- 07. Physical and Environmental Controls\\/07_10-Fencing.mp45.45MB
- 07. Physical and Environmental Controls\\/07_11-Proximity Readers and Access Lists.mp45.97MB
- 07. Physical and Environmental Controls\\/07_12-Proper Lighting and Signs.mp45.63MB
- 07. Physical and Environmental Controls\\/07_13-Barricades.mp42.18MB
- 07. Physical and Environmental Controls\\/07_14-Biometrics.mp41.98MB
- 07. Physical and Environmental Controls\\/07_15-Protected Distribution Systems.mp410.88MB
- 07. Physical and Environmental Controls\\/07_16-Alarms and Motion Detection.mp44.60MB
- 07. Physical and Environmental Controls\\/07_17-Control Types.mp49.46MB
- 08. Risk nagement Best Practices\\/08_01-Module Overview.mp42.87MB
- 08. Risk nagement Best Practices\\/08_02-Business Continuity Concepts.mp45.27MB
- 08. Risk nagement Best Practices\\/08_03-Business Impact Analysis.mp47.31MB
- 08. Risk nagement Best Practices\\/08_04-Identification of Critical Systems and Components.mp43.17MB
- 08. Risk nagement Best Practices\\/08_05-Removing Single Points of Failure.mp43.59MB
- 08. Risk nagement Best Practices\\/08_06-Business Continuity Planning and Testing.mp46.79MB
- 08. Risk nagement Best Practices\\/08_07-Risk Assesent and Continuity of Operations.mp46.03MB
- 08. Risk nagement Best Practices\\/08_08-Disaster Recovery Planning.mp48.49MB
- 08. Risk nagement Best Practices\\/08_09-IT Contingency Planning.mp45.48MB
- 08. Risk nagement Best Practices\\/08_10-Succession Planning.mp42.92MB
- 08. Risk nagement Best Practices\\/08_11-High ailability.mp47.80MB
- 08. Risk nagement Best Practices\\/08_12-Redundancy.mp48.42MB
- 08. Risk nagement Best Practices\\/08_13-Table Exercises.mp46.81MB
- 08. Risk nagement Best Practices\\/08_14-Fault Tolerance.mp44.18MB
- 08. Risk nagement Best Practices\\/08_15-RAID.mp411.29MB
- 08. Risk nagement Best Practices\\/08_16-Clustering.mp43.82MB
- 08. Risk nagement Best Practices\\/08_17-Load Balancing.mp43.61MB
- 08. Risk nagement Best Practices\\/08_18-Servers.mp41.66MB
- 08. Risk nagement Best Practices\\/08_19-Backup Plans Execution and Frequency.mp47.79MB
- 08. Risk nagement Best Practices\\/08_20-Hot Warm and Cold Sites.mp411.94MB
- 09. Appropriate Controls to Meet Security Goals\\/09_01-Module Overview.mp44.31MB
- 09. Appropriate Controls to Meet Security Goals\\/09_02-Encryption.mp46.74MB
- 09. Appropriate Controls to Meet Security Goals\\/09_03-Access Controls.mp41.72MB
- 09. Appropriate Controls to Meet Security Goals\\/09_04-Steganography.mp418.24MB
- 09. Appropriate Controls to Meet Security Goals\\/09_05-Digital Signatures.mp45.51MB
- 09. Appropriate Controls to Meet Security Goals\\/09_06-Certificates.mp47.35MB
- 09. Appropriate Controls to Meet Security Goals\\/09_07-ailability Redundancy Fault Tolerance and Patching.mp47.36MB
- 09. Appropriate Controls to Meet Security Goals\\/09_08-Safety.mp43.90MB
- 09. Appropriate Controls to Meet Security Goals\\/09_09-Lighting.mp42.33MB
- 09. Appropriate Controls to Meet Security Goals\\/09_10-Locks.mp41.30MB
- 09. Appropriate Controls to Meet Security Goals\\/09_11-.mp41.87MB
- 09. Appropriate Controls to Meet Security Goals\\/09_12-Escape Plans Escape Routes and Drills.mp44.41MB
- 09. Appropriate Controls to Meet Security Goals\\/09_13-Testing Controls.mp43.12MB
- Exercise Files\\/comptiasecurityplussy0401complianceoperationalsecurity.zip29.13MB
- CreateTime2022-12-14
- UpdateTime2022-12-20
- FileTotalCount121
- TotalSize1.54GBHotTimes5ViewTimes10DMCA Report EmailmagnetLinkThunderTorrent DownBaiduYunLatest Search: 1.SOE-833 2.ARM-113 3.MVBD-010 4.OPBD-051 5.RKI-185 6.FTA-176 7.SBB-118 8.HITMA-69 9.GOD-061 10.CHHT-010 11.UMD-323 12.IDBD-332 13.DAPS-074 14.DOKS-277 15.ID-21028 16.BOMN-041 17.ASFB-010 18.DMBA-135 19.MOBSP-006 20.ONSD-566 21.ERDV-164 22.ONSD-614 23.RCT-483 24.JUSD-433 25.IDBD-229 26.RKI-173 27.MIBD-572 28.ONSD-376 29.ONSD-379 30.AMD-216 31.GOD-124 32.JUSD-347 33.IDBD-087 34.JUSD-401 35.ONSD-421 36.ONSD-590 37.KRBV-053 38.ONSD-391 39.BOBB-143 40.CAGC-001 41.MOLD-14 42.CRPD-230 43.CC-132 44.RKI-251 45.ARMG-067 46.LBOY-001 47.MADV-183 48.OPBD-092 49.SDMT-766 50.AAJB-006 51.MGMF-002 52.DDB-220 53.RKI-185 54.CADV-346 55.SMD-30 56.KYWX-001 57.NADE-043 58.VSPDS-219 59.MBD-003 60.T28-203 61.DVH-380 62.M-447 63.M-528 64.KA-1363 65.BNDV-775 66.GPS-263 67.MA-329 68.GESD-147 69.SEA-350 70.NBRD-007 71.153 72.479 73.04 74.11 75.014 76.040 77.048 78.567 79.041 80.022 81.277 82.024 83.200 84.227 85.761 86.014 87.579 88.202 89.543 90.003 91.038 92.042 93.377 94.605 95.713 96.421 97.223 98.525 99.030 100.002 101.85 102.315 103.466 104.029 105.001 106.201 107.161 108.172 109.569 110.28 111.19 112.006 113.31 114.78 115.093 116.136 117.104 118.328 119.199 120.234 121.002 122.352 123.467 124.090 125.121 126.178 127.0046 128.01 129.043 130.033 131.0005 132.021 133.102 134.0 135.001 136.002 137.444 138.612 139.817 140.781